@@ -10,7 +10,6 @@ const native_fs_utils = require('../util/native_fs_utils');
10
10
const { create_arn, get_action_message_title, check_iam_path_was_set } = require ( '../endpoint/iam/iam_utils' ) ;
11
11
const { IAM_ACTIONS , MAX_NUMBER_OF_ACCESS_KEYS , IAM_DEFAULT_PATH ,
12
12
ACCESS_KEY_STATUS_ENUM , IDENTITY_ENUM } = require ( '../endpoint/iam/iam_constants' ) ;
13
- const nsfs_schema_utils = require ( '../manage_nsfs/nsfs_schema_utils' ) ;
14
13
const IamError = require ( '../endpoint/iam/iam_errors' ) . IamError ;
15
14
const cloud_utils = require ( '../util/cloud_utils' ) ;
16
15
const SensitiveString = require ( '../util/sensitive_string' ) ;
@@ -150,10 +149,7 @@ class AccountSpaceFS {
150
149
is_username_update ) ;
151
150
await this . _update_account_config_new_username ( action , params , requested_account ) ;
152
151
} else {
153
- const requested_account_encrypted = await nc_mkm . encrypt_access_keys ( requested_account ) ;
154
- const account_string = JSON . stringify ( requested_account_encrypted ) ;
155
- nsfs_schema_utils . validate_account_schema ( JSON . parse ( account_string ) ) ;
156
- await this . config_fs . update_account_config_file ( JSON . parse ( account_string ) ) ;
152
+ await this . config_fs . update_account_config_file ( requested_account ) ;
157
153
}
158
154
this . _clean_account_cache ( requested_account ) ;
159
155
return {
@@ -265,11 +261,8 @@ class AccountSpaceFS {
265
261
deactivated : false ,
266
262
} ;
267
263
requested_account . access_keys . push ( created_access_key_obj ) ;
268
- const requested_account_encrypted = await nc_mkm . encrypt_access_keys ( requested_account ) ;
269
- const account_to_create_access_keys_string = JSON . stringify ( requested_account_encrypted ) ;
270
- nsfs_schema_utils . validate_account_schema ( JSON . parse ( account_to_create_access_keys_string ) ) ;
271
264
await this . config_fs . update_account_config_file (
272
- JSON . parse ( account_to_create_access_keys_string ) ,
265
+ requested_account ,
273
266
{ new_access_keys_to_link : [ created_access_key_obj ] }
274
267
) ;
275
268
return {
@@ -355,10 +348,7 @@ class AccountSpaceFS {
355
348
return ;
356
349
}
357
350
access_key_obj . deactivated = this . _check_access_key_is_deactivated ( params . status ) ;
358
- const requested_account_encrypted = await nc_mkm . encrypt_access_keys ( requested_account ) ;
359
- const account_string = JSON . stringify ( requested_account_encrypted ) ;
360
- nsfs_schema_utils . validate_account_schema ( JSON . parse ( account_string ) ) ;
361
- await this . config_fs . update_account_config_file ( JSON . parse ( account_string ) ) ;
351
+ await this . config_fs . update_account_config_file ( requested_account ) ;
362
352
this . _clean_account_cache ( requested_account ) ;
363
353
} catch ( err ) {
364
354
dbg . error ( `AccountSpaceFS.${ action } error` , err ) ;
@@ -398,11 +388,8 @@ class AccountSpaceFS {
398
388
}
399
389
requested_account . access_keys = requested_account . access_keys . filter ( access_key_obj =>
400
390
access_key_obj . access_key !== access_key_id ) ;
401
- const requested_account_encrypted = await nc_mkm . encrypt_access_keys ( requested_account ) ;
402
- const account_string = JSON . stringify ( requested_account_encrypted ) ;
403
- nsfs_schema_utils . validate_account_schema ( JSON . parse ( account_string ) ) ;
404
391
await this . config_fs . update_account_config_file (
405
- JSON . parse ( account_string ) ,
392
+ requested_account ,
406
393
{ access_keys_to_delete : [ { access_key : access_key_id } ] }
407
394
) ;
408
395
this . _clean_account_cache ( requested_account ) ;
@@ -628,9 +615,7 @@ class AccountSpaceFS {
628
615
const master_key_id = await nc_mkm . get_active_master_key_id ( ) ;
629
616
const created_account = this . _new_user_defaults ( requesting_account , params , master_key_id ) ;
630
617
dbg . log1 ( `AccountSpaceFS.${ action } new_account` , created_account ) ;
631
- const new_account_string = JSON . stringify ( created_account ) ;
632
- nsfs_schema_utils . validate_account_schema ( JSON . parse ( new_account_string ) ) ;
633
- await this . config_fs . create_account_config_file ( JSON . parse ( new_account_string ) ) ;
618
+ await this . config_fs . create_account_config_file ( created_account ) ;
634
619
return created_account ;
635
620
}
636
621
@@ -665,8 +650,6 @@ class AccountSpaceFS {
665
650
this . _check_if_user_does_not_have_access_keys_before_deletion ( action , account_to_delete ) ;
666
651
}
667
652
668
- // TODO - when we have the structure of config we can check easily which buckets are owned by the root account
669
- // currently, partial copy from verify_account_not_owns_bucket
670
653
async _check_if_root_account_does_not_have_buckets_before_deletion ( action , account_to_delete ) {
671
654
const resource_name = 'buckets' ;
672
655
const bucket_names = await this . config_fs . list_buckets ( ) ;
@@ -710,10 +693,7 @@ class AccountSpaceFS {
710
693
requested_account . name = params . new_username ;
711
694
requested_account . email = params . new_username ; // internally saved
712
695
// handle account config creation
713
- const requested_account_encrypted = await nc_mkm . encrypt_access_keys ( requested_account ) ;
714
- const account_string = JSON . stringify ( requested_account_encrypted ) ;
715
- nsfs_schema_utils . validate_account_schema ( JSON . parse ( account_string ) ) ;
716
- await this . config_fs . update_account_config_file ( JSON . parse ( account_string ) , { old_name : params . username } ) ;
696
+ await this . config_fs . update_account_config_file ( requested_account , { old_name : params . username } ) ;
717
697
}
718
698
719
699
_check_root_account_or_user ( requesting_account , username ) {
0 commit comments